Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

An incident response methodology can be explained as a collection of procedures aimed at identifying, investigating and responding to potential security incidents in a way that minimizes impact and supports rapid recovery. In this blog, we'll explain how to use the OODA Loop, developed by US Air Force military strategist John Boyd, to create your own incident response methodology.… Read more

Tags: incident response

This is Part 8 & 9 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with what was formerly known as the "SANS Top 20 Security Controls". It is now known as the CIS Security Controls. A summary of the previous posts is here: Part 1 - we looked at Inventory of Authorized and… Read more

Tags: security training, data recovery

Download full PDF. VioPoint's Story Based out of Auburn Hills, Michigan, VioPoint is an AlienVault™ Managed Security Service Provider (MSSP). The company has been in business for nearly nine years and originally started out as a product and sales organization. As the company grew their business, it also began offering security-training services. Today, VioPoint’s core business… Read more

Tags: mssp, viopoint

Each January 28th, we celebrate International Data Privacy Day. Around this time, the Internet sees a deluge of blog posts talking about how to secure your personal data, and how companies can best protect your privacy. This article is not one of them. Rather, we’re going to take a look at the seven wackiest, most unusual places people… Read more

Tags: data loss

Just how bad is the challenge of retaining IT security professionals? When I was asked to write this blog, I didn’t know, so I decided to do some research. Methodology and Scope The full report is based on an online user survey that gathered 132 responses. I supplemented the findings of this survey with secondary research from industry practitioners… Read more


Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content